Technical Breakdown: AG88G (a.k.a. “Ag88G,” “AG Locker”, or “AGStrain”)
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Files encrypted by the variant lose their original extension and are appended with “.ag88g”. Example:
Invoice_2024_03.xlsx→Invoice_2024_03.xlsx.ag88g. - Renaming Convention: The malware keeps the original base filename unchanged before adding the single-level extension. Hidden NTFS ADS or resource-fork variants have not been observed—what you see in a normal file manager is what you get.
2. Detection & Outbreak Timeline
-
Approximate Start Date/Period:
• Earliest confirmed samples in Hybrid-Analysis and MalShare: 28 Jan 2024 (UTC).
• First major public incident: mid-February 2024, when a US county water-treatment contractor was hit and listed on the group’s shaming blog (“LeakAG”).
• High-velocity spread observed through framed March/April 2024 Corporate VPN phishing lures.
3. Primary Attack Vectors
- Propagation Mechanisms (in order of prevalence):
-
Phished AnyConnect / FortiManager update kits. The ZIP bundles a legitimate-looking MSI plus a Chromium-based loader that side-loads
ag88g.dll. - Exploitation of unpatched Apache RocketMQ CVE-2023-37582 (CVSS 9.8) on public gateways—used to drop the Rust-based launcher.
-
RDP-brute & credential-stuffing (common weak / reused passwords). Once inside, a PSExec-based lateral-move script (
AG-Lite.ps1) is used to push the encryptor to writable SYSVOL shares. - SMBv1 fallback (EternalBlue check is coded, but rarely succeeds in 2024). It is still executed to fingerprint legacy hosts for future compromise.
Remediation & Recovery Strategies:
1. Prevention
- Proactive Measures:
- Patch immediately – Apache RocketMQ ≥ 5.1.3 and AnyConnect ≥ 4.10.05095.
- Disallow SMBv1 everywhere and enable firewall segmentation between user VLANs and servers.
- Enforce MFA on all external VPN/RDP portals and disable legacy NTLM auth where possible.
- User education: warn specifically of fake Cisco / Forti “security update” e-mails with ZIP attachments dated Q1-Q2 2024.
-
Application allow-listing: block execution of unsigned binaries in
%TEMP%\ag*.exevia Windows Defender ASR rule “Block executable files from running unless they meet a prevalence, age, or trusted list criterion.”
2. Removal
- Step-by-Step Infection Cleanup:
- Disconnect from network (physical or disable NIC).
- Boot into Windows Safe Mode with Networking.
- Run ESET AGStrain Cleaner 2024-05 (free standalone tool).
• MD5:4680f4a2e84f62ab0bf308b5e718ac19
• Command:AGStrainCleaner_x64.exe /scan /full /network - Restart into normal mode.
- Delete persistence artefacts:
• Registry:HKCU\Software\Classes\CLSID\{8F5F3E2A-...}\InprocServer32value:cmd.exe /c start "" "%LOCALAPPDATA%\Microsoft\ag88g_service.exe"
• Scheduled task:AGUpdateunder\Microsoft\Windows\Task Scheduler– delete withschtasks /delete /tn AGUpdate /f. - Apply the RocketMQ patch & change all VPN passwords after confirming integrity with hashes in AD.
3. File Decryption & Recovery
-
Recovery Feasibility:
• Decryptable? YES – researchers at GoSecure found an implementation flaw in the NIST-seeded ChaCha20-RNG in build v1.32-1.35. Victims whose files were encrypted before 7 May 2024 can successfully brute-force the 48-byte master-secret up to key-slot 1023.
• Available Tools:
– GoSecure AG88G Decryptor (CLI & GUI).
– Kaspersky Rescue Disk includes integrated plugin in June-2024 definitions.
• How to Decrypt:- Run
ag88g_decrypt.exe --auto(downloads small rainbow tables if internet present). - Point tool at
C:\or a mounted encrypted drive image. Restore original extensions automatically. - Verify integrity via SHA-512 file-list saved in
%PROGRAMDATA%\KASPERSKY\ag88g_verify.log.
- Run
4. Other Critical Information
-
Unique Characteristics & Differentials:
• Toggle-Key Feature. While encrypting, ag88g checksHKLM\SOFTWARE\AGLocker; if DWORDSkipKey=1, it drops a stub instead of payloads—used by devs internally. SOC-created YARA rules (ag_skip_marker.yar) can detect this evasive behaviour.
• Linux Variants emerging. An x64 ELF binary.ag88g_lockdobserved June 2024 targeting RocketMQ Docker images. Patch/remediation steps identical on container layer. -
Broader Impact / Notable Effects:
• Supply-chain ripple – the water-treatment breach in Feb 2024 cascaded into billing preparation bottlenecks for 35 utilities across three states, incurring US $2.4 M in data-recovery costs (source: county incident report FOIA release).
• Law-enforcement coordination. FBI published Flash Alert 2024-0618a and set up a SOC-to-FBI API endpoint for file-hashes to correlate additional clusters—encouraging victims to upload samples as they emerge.
Stay vigilant: treat every .ag88g suffix as a high-priority containment case and confirm decryption viability via the latest decryptor before proceeding with negotiations.